Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

OSS Presentation Keynote by Hal Stern

1,430 views

Published on

Published in: Technology
  • Be the first to comment

OSS Presentation Keynote by Hal Stern

  1. 1. The New Network is Programmable Hal SternChief Architect, Developer Business Unit Juniper Networks
  2. 2. Legal StatementThis presentation sets forth Juniper Networks’ current intentionand is subject to change at any time without notice. Nopurchases are contingent upon Juniper Networks deliveringany feature or functionality depicted. The information and analysis provided in any Juniper Business Analysis are prepared for illustrative purposes only and should not be relied upon by participants as representative of actual results. Actual results of implementation of any Juniper Networks product or solution may vary based upon factors beyond the scope of analysis and/or beyond the control of Juniper Networks. Juniper Business Analysis does not constitute an offer, warranty or representation by or on behalf of Juniper Networks, Inc. and/or its subsidiaries, partners or affiliates
  3. 3. The Un-informed State TodayTHE HUMAN WORLD THE NETWORK WORLDApplications blindly probe the Networks spy on traffic to trynetwork to understand what it to understand applicationscan deliverNetwork Aware Applications: Application Aware Networking: Game ping-stats, Doppler,  Deep Packet Inspection, Geo-location, whois, Deep Flow Inspection proprietary codecs,  Approximate application by proprietary control channels fingerprinting Approximate topology/location  Service specific overlay topologies
  4. 4. A More Ideal StateBringing together the important players… … to enable interaction and influence the experience of the end user Application: Content: End-User: Network: Knows what the end-user Adjusts placement and Knows what it wants and Real-time interaction capabilities are. Informs selection of content to is directed there between application, placement of content in end-user, application content and end-users. proximity of end-user. desires and analytics. Enables multiple Control of resources. policy/profile points
  5. 5. What Is Possible? NETWORK APPLICATION APPLICATION NETWORK Applications made better by Networks made better by information information from network from application Understanding of end-device capabilities  Bandwidth and resource optimization Real location / topology information  New service topologies Adjust behavior to real-time usage or  Protect network assets in real-time availability  Closed user security groups Regulatory compliance  Security identification Analytics of in-home usage  Disambiguate sessions Billing granularity  Disambiguate priorities Control of Resources from Flexibility of Service Placement Applications
  6. 6. Why Do You Care?• Developers love to tinker. --Cory Doctorow• Every single bit of storage is accessed over a network.• It’s time to start tinkering up and down the stack.
  7. 7. Tinkering With Storage• Drivers – SCSI, FC…. – Controller/general purpose system convergence• Filesystems – Performance – Naming – Redundancy
  8. 8. Tinkering, Embedding Networks
  9. 9. Storage In The Large == Networking In The Larger• Cost/Transit models for public/hybrid cloud• Security for data in motion• Congestion, latency and jitter are intentional• What does deep packet inspection show? – Popular storage buckets – Application access signatures – Latency sensitivity
  10. 10. Return of the Smart Network Voice Mostly Internet Converged Core 1975-1995 1995-2010 2010-Network is… Smart Dumb SmarterClients are…. Really dumb Smart SmarterData Rate 2.4 kb/s 10 Mb/s 100 Gb/sDefining immediate immediate immediateFactor connection access experience
  11. 11. Time and Functional Domains Analysis Modeling Action securityDesign posture QoS service levelReal-Time enforcement cloud placement threat,Historical failure cloud cost analysis
  12. 12. It’s déjà vu all over again• Evolving APIs on the network software assets….• Create new consumption and constraint patterns…• Requiring network-level information
  13. 13. Impact on Storage: Deutsch’s 8 Fallacies1. The network is reliable2. Latency is zero3. Bandwidth is infinite Virtualization and cloud4. The network is secure computing make bad assumptions worse5. Topology doesnt change6. There is one administrator7. Transport cost is zero8. The network is homogeneous
  14. 14. Information Creation• Point in Time • Annotation • Topology• Real Time • Context • Service Definition• Long Time • Corroboration • Metadata • Correlation • Analytics • Optimization
  15. 15. Decoupling of Control Points Policy Flows/Filtering Content/Resource Placement Delivery/Experience logsApplications statistics Networks ephemeral adapt to history adapt to networks state applications topology context
  16. 16. Closed-Loop SystemAction ValueConfigure FilterProvision GENERATE CorrelateDynamic Policy AFFECTS Combine INSIGHTAssets Data Inventory CREATE History Real-timeNetworking Devices, Servers,Databases, Applications etc.
  17. 17. Under The Hood NBI Bridge Java (and other languages) SOA, MTOSI via REST APIs & Libraries Interface Services users, RBAC, application deployment, UI, RESTful wrappersElement and Network Services Data Services inventory, topology, fabric, jobs, tagging, taxonomy, join/product, indexing, device management search/query Local Persistence DMI Database cluster
  18. 18. Making Networks Programmable 3rd party3rd party applications & AppsSDKs & SDKs Enterprise SI Partner ISV Service Research Partner Provider Institution Customer Pulse - Endpoint Web Services APIs Space - Across the network CDN Data Center Control Management Data / Network APIs API API Packet API … … Junos SDK Network device
  19. 19. Content Request Routing  Content Availability  Per network response DNS Partner  Content Load times and site availability  Content CapacityNew York Chicago Data Center  Network Proximity Where do I get Answer:  Network Availability DNS my content? Chicago!  Network ISP A Congestion Media Flow Controller London London Data Center DNS ISP B BGP BGP Media Flow Controller Paris Network Data Server Amsterdam Data Center DNS ISP C Media Flow Controller
  20. 20. Bandwidth Calendaring Schedule a reserved path for your session… … without having to know the network.  Real-time topology understanding  Steering traffic through optimal paths  Reservation transaction (WebServices API)  Selecting specific traffic Web Services API Orchestration What would I use this for?  Flexibility of service placement Network  Scheduled data center backups  Managed content distribution • Pre-positioning, live events  Map-reduce class compute jobs • HPC data processing, search  Cloud orchestration • Mobility of storage/VMsLocation 1 Location 2Scheduled and created application/session specific path through the network
  21. 21. JouleX Energy Manage (JEM) JouleX JEM Application11 /device-management/devices12 /device-management/devices/{device id} Junos Space Platform13 /device-management/devices/{device id}/exec- rpc11 Retrieve all devices under management API Native Apps12 Get info for a single device managed by platform13 RPC call to single device to get the power usage information. RPC for EX82xx: <get-power-budget-information> RPC for other Junos devices Platform <get-environment-pem-information> DMI/NetConf
  22. 22. Informing Applications Abstracted Network view • Map interface (network and cost maps) Network & Service data • Endpoint Cost query interface Geo location Subscriber Info Load/Utiliz Data Server ation Topology Clients TE Data(Network-aware Application-friendly protocol Source-specific protocols applications) • RESTful Web Service (Routing protocols, DMI, Data • JSON message encoding SNMP, WS, …) Sources
  23. 23. Network Application Domains• Content / Service Routing – Locate best copy of content for the end user, using customer rules• Managed content distribution – Content prepositioning to caches – Live events• Map-Reduce class of applications as consumers and producers – High-end distributed computing informed by and informing placement• Cloud OS network operations – Move VMs / Apps / Storage between locations• Cloudburst – Flexible on-demand allocation of cloud & network capacity• Security – DDoS attack prevention
  24. 24. Informing Control Points• What activities create the most traffic?• Where is latency introduced? Congestion?• What impacts user experience the most?• Extending network vocabulary to general purpose applications• Content networking as a future: – More about what, who, when of access, not where – Resource oriented: things you link, copy, incorporate and extend
  25. 25. What About “Big Data”“If you’re good at distribution (*), then you’re generating data. Use it.”Steve O’Grady, analyst, Redmonk “Big Data + Open Source = Big Money”(*) distribution of bits == networking
  26. 26. Data-Driven Use Case“Big Data” Business Constraints Hadoop Domain Real Time AnalyticsJava Developer Domain Ephemeral State Updates Tag/Filter/Join Configuration Event/Log Data Flow Data
  27. 27. Application Ecosystems 3rd Party 3rd Party Experience governed through App App data insight & ephemeral state control: make network aware of External Developer APIs applications Flow Content Subscriber Existing Systems Analysis Placement Analytics Junos Space APIs Make applications aware of network: Junos Spaceresources, integration points, services exposed Control Management Data / … … API API Packet API Network APIs Junos SDK Network device
  28. 28. Hard Problems…• Triangulating security, privacy and trust• Precision• Complexity – Running into potentially intractible (NP-Hard) problems with network structures and cost minimization• Time
  29. 29. Reach Info & Resourceshstern@juniper.net@freeholdhal Developer Information & Resources www.juniper.net/developer @junosdeveloper helpmebuildmyapp@juniper.net

×